Most Read Research Articles


Warning: Creating default object from empty value in /var/www/html/sandbox.ijcaonline.org/public_html/modules/mod_mostread/helper.php on line 79

Warning: Creating default object from empty value in /var/www/html/sandbox.ijcaonline.org/public_html/modules/mod_mostread/helper.php on line 79

Warning: Creating default object from empty value in /var/www/html/sandbox.ijcaonline.org/public_html/modules/mod_mostread/helper.php on line 79

Warning: Creating default object from empty value in /var/www/html/sandbox.ijcaonline.org/public_html/modules/mod_mostread/helper.php on line 79

Warning: Creating default object from empty value in /var/www/html/sandbox.ijcaonline.org/public_html/modules/mod_mostread/helper.php on line 79
Call for Paper - May 2015 Edition
IJCA solicits original research papers for the May 2015 Edition. Last date of manuscript submission is April 20, 2015. Read More

Steganography using Social Impact Theory based Optimization (SITO)

Print
PDF
International Journal of Computer Applications
© 2014 by IJCA Journal
Volume 101 - Number 16
Year of Publication: 2014
Authors:
Amanjot Kaur
Shruti Mittal
10.5120/17770-8594

Amanjot Kaur and Shruti Mittal. Article: Steganography using Social Impact Theory based Optimization (SITO). International Journal of Computer Applications 101(16):9-12, September 2014. Full text available. BibTeX

@article{key:article,
	author = {Amanjot Kaur and Shruti Mittal},
	title = {Article: Steganography using Social Impact Theory based Optimization (SITO)},
	journal = {International Journal of Computer Applications},
	year = {2014},
	volume = {101},
	number = {16},
	pages = {9-12},
	month = {September},
	note = {Full text available}
}

Abstract

With a great advancement in science and technology, efficient techniques are needed for the purpose of security and copyright protection of the digital information being transmitted over the internet and for secret data communication. Thus, Steganography solves this purpose which has been used widely. Even though, a Stego-object may be exposed to noise or compression due to which the secret data cannot be extracted correctly at the receiver's end, when the transmission occours. This paper presents an efficient image hiding scheme, Social Impact theory based Optimization (SITO). Here, a fitness function is computed based on certain texture properties and entropy of a host image. According to this, the block holding the most relevant fitness value is the place where embedding of the secret data (secret image) is done. Thus, a stego-image is retrieved at the other end, which is not only good in quality but is also able to sustain certain noise and compression attacks during the transmission. The objective function is defined in such a manner that both quality and robustness of the stego image are acceptable, for which the performance analysis parameter values of the stego-image are also determined. The results, when compared with some other data hiding technique show better stego image quality along with distortion tolerance.

References

  • Punam Bedi, Roli Bansal, Priti Sehgal, "Using PSO in a spatial domain based image hiding scheme with distortion tolerance", Elsevier Springer, 2013
  • Sunil. K. Moon 1, Rajeshree. D. Raut, "Analysis of Secured Video Steganography Using Computer Forensics Technique for Enhance Data Security", IEEE, 2013.
  • Ali K. Hmood1, Z. M. Kasirun1, Hamid A. Jalab1, Gazi Mahabubul Alam3, A. A. Zaidan2 and B. B. Zaidan2, "On the accuracy of hiding information metrics", International Journal of the Physical Sciences Vol. 5(7), pp. 1054-1062, August, 2010
  • Cheng-Hsing Yang, Chi-Yao Weng,"Adaptive Data Hiding in Edge Areas of Images with Spatial LSB Domain Systems "IEEE Transactions on Information Forensics and Security, Vol. 3, No. 3, September 2008
  • Neil Johnson, Eliminating Steganography in Internet Traffic with active wardens", Springer, 2003
  • M. Al Htammami, "A proposed Modified Data Encryption Standard algorithm by using Fusing Data Technique", WCSIT, Vol. 1. No. 3, 88-91-2011
  • Adnan Abdul-Aziz Gutub, Wael Al-Alwani, and Abdulelah Bin Mahfoodh ,"Improved method of arabic text steganography using the extension "Kashida' character", BUJICT, vol3, Issue 1, Dec 2010
  • Lei Zheng, Ingemar J Cox, "JPEG based conditional entropy coding for correlated steganography", IEEE, 2007
  • Ali Al-Ataby and Fawzi Al-Naima, "A Modified High Capacity Image Steganography Technique Based on Wavelet Transform", International Arab Journal of Information Technology, Vol 7, No. 4, Oct 2010
  • Rosziati Ibrahim, "Steganography Algorithm to hide Secret Message inside an image", Computer Technology and Application, Feb 2011
  • Nelly Fazio, Antonio R. Nicolosi and Irippuge Milinda Perera "Broadcast Steganography", Springer, Vol 8366, 2014
  • Biswapati Jana, Debasis Giri,Shymal Kumar Mondal, Pabitra Pal,"Image Steganography based on Cellular Automata", IJPAM, Vol 83, No. 5, 2013
  • Parisa Gerami, Subariah Ibrahim, Morteza Bashardoost, "Least Significant Bit Image Steganography using Particle Swarm Optimization and Optical Pixel Adjustment", IJCA, Volume 55– No. 2, October 2012
  • Xiaoxia Li, Jianjun Wang, "A steganographic method based upon JPEG and particle swarm optimization algorithm", Elsevier, Science Direct, Feb 2007
  • Faramarz Sadeghi, Marjan Kuchaki Rafsanjani, Fatemeh Zarisfi Kermani, "Hiding Information in Image by Compound Meta-Heuristic Algorithm PSO-SA", IJCSAI, Vol. 3 Iss. 4 Dec. 2013
  • Amrita Khamruia, J K Mandal, "A Genetic Algorithm based Steganography using Discrete Cosine Transformation (GASDCT)", Elsevier, ScienceDirect, 2013
  • Parisa Gerami, Subariah Ibrahim, Morteza Bashardoost, "Least Significant Bit Image Steganography using Particle Swarm Optimization and Optical Pixel Adjustment, IJCA, Volume 55– No. 2, October 2012
  • Ko-Chin Changa, Chien-Ping Changa, Ping S. Huangb, and Te-Ming Tua "A Novel Image Steganographic Method Using Tri-way Pixel-Value Differencing, Journal of Multimedia, Vol No. 2, 2008
  • Chung-Ming Wang, Nan-I Wu, Chwei-Shyong Tsai, Min-Shiang Hwang, " A high quality steganographic method with pixel-value differencing and modulus function", Elsevier, Science Direct, 2007
  • V. Nagaraj, Dr. V. Vijayalakshmi and Dr. G. Zayaraz, "Color Image Steganography based on Pixel Value Modification Method Using Modulus Function", Elsevier, Science Direct, 2013
  • A OS. A. Z. Ansaef, "High Security Cover File of hidden data using statistical technique and AES encryption algorithm", Vol3, 2009
  • Weiqi Luo and Jiwu Huang, "Edge Adaptive Image Steganography Based on LSB Matching Revisited", IEEE, Vol5, No. 2, June 2010
  • Martin Maca's and Lenka Lhotsk'a, "Simplified Social Impact Theory Based Optimizer in Feature Subset Selection", Springer, 2011
  • Macas, M. , Lhotska, L. and Kremen, V, "Social Impact based Approach to Feature Subset Selection", International Workshop on Nature Inspired Cooperative Strategies for Optimization, Studies in Computational Intelligence, Springer, 2007
  • Macas, M. and Lhotska, L. , "Social Impact Theory based Optimizer", Advances in Artificial: 9th European Conference on Artificial Life, Heidelberg: Springer, pp. 635-644, 2007
  • Macas, M. and Lhotska, L, "Social Impact and Optimization", 2nd European Symposium on Nature-inspired Smart Information Systems, 2006